Search SchoolNGR

Saturday, 04 April 2026
Register . Login

Computer Studies Past Questions and Answers

Computer Studies Questions

Question 251:
Running other software on idle computer without the knowledge of the organisation is called theft of ____________
  • A Software
  • B Computer
  • C Computer time
  • D Use
View Answer & Explanation
Question 252:
Sensitive data can be protected from prying eyes using ____________
  • A File permissions
  • B File locks
  • C Passwords
  • D Encryption
View Answer & Explanation
Question 253:
The number of input combination for a 4 input gate is ____________
  • A 9
  • B 8
  • C 15
  • D 16
View Answer & Explanation
Question 254:
When does the output of a NOR gate =0?
  • A Whenever 0 is present at input
  • B Only when all input =0
  • C Whenever 1 is present at input
  • D Only when all input =1.
View Answer & Explanation
Question 255:
A collection of facts and figures is known to be ____________
  • A Data
  • B Database
  • C Sequenced data
  • D Structural data
View Answer & Explanation